Download as pdf or txt
Download as pdf or txt
You are on page 1of 285

POLICE INTELLIGENCE

1
2
3
SUN TZU
“If you know your enemy and know
yourself, you need not fear the results of
hundred battles.

If you know yourself but not the enemy, for


every victory, you will suffer defeat.

If you know neither yourself nor the enemy,


you are fool who will meet defeat in
every battle.”
4
HISTORY OF INTELLIGENCE

5
Moses
 one of the first
recorded formalized
intelligence efforts,
with format can be
found in the Holy
Bible (Numbers
13:17).
◦ He sent 12 leaders of
Israel to spy out the
land of Canaan
(Numbers 13:17-21).

6
Holy Bible Book of Numbers 13:17
“And Moses sent them to spy out the land of
Canaan and said unto them, get you up this way
southward, and go up into the mountain; and see
the lands, what it is; and the people that dwell
therein, whether they are strong or weak, few or
many; and what the land they dwelt in, whether
in tents, or in strongholds; and what land is;
whether it be fat or lean, whether there be wood
therein, or not. And be of good courage and bring
of the fruit of the land.”

7
THE 12 MEN SENT BY MOSES TO SPY CANAAN-heads of
the children of isreal

SHAMMUA THE SON OF ZACCUR – Tribe of


Reuben
SHAPAT THE SON OF HORI – Tribe of Simeon
CALEB THE SON OF JEPHUNNEH – Tribe of
Judah
IGAL THE SON OF JOSEPH – Tribe of Issachar
HOSHEA THE SON OF NUN – Tribe of Ephraim
PALTI THE SON OF RAPHU – Tribe of Benjamin
GADDIEL THE SON OF SODI – Tribe of Zebulun
GADDI THE SON OF SUSI – Tribe of Joseph, that is from the
Tribe of Manasseh
AMMIEL THE SON OF GEMALLI – Tribe of Dan
SETHUR THE SON OF MICHAEL – Tribe of Asher
NAHBI THE SON OF VOPSHI – Tribe of Napthali
GEUEL THE SON OF MACHI – Tribe of Gad
Rahab
 the harlot of Jericho
(Joshua 2:1-21) who
sheltered and
concealed the agents
of Israel, she made a
covenant with the
agents and duped
their pursuers.

9
Delilah
 She was an
impromptu
intelligence agent of
the Philistines. She
allowed Philistine
spies to hide in her
house (Judges 16:9)
and used her
femininity to gain
intelligence from a
powerful enemy.

10
Sun Tzu

 According to him, what is called


foreknowledge cannot be
elicited from spirits, or from
gods, or from analogy with past
events nor from calculations.
 He wrote, “It must be
obtained from men who
new the enemy situation.”
 Wrote the book, The Art of
War.

12
Alexander The Great
 While marching in
Asia, he investigated
all the letters and the
detection of the
malcontents whether
the legitimate cause
were exposed.

13
Sertorius, Quintus
 A possessor of the
white fawn that tried
to follow Polyaenus
everywhere.
 The Fawn was used as
intelligence agent.
 His intelligence agents
credited their
information to the
supernatural power of
animals.

14
Akbar
 The “Great Mogul”
and sagacious master
of Hindustan who
employed more than
four thousand agents
for the sole purpose
of bringing him the
truth that his throne
might rest upon him.

15
Genghis Khan

 Born in Pakistan
 He instructed his generals to
send spies and used prisoners
as sources of information.
 The leader of the so-called
Mongol conquerors and used
effective propaganda by
spreading rumors of Mongol
terror.
 He has 36 wives.

16
Frederick, The Great
“The father of
organized military
espionage”

18
He divided his agents into four
classes:
 Common spies- recruited among poor folk,
glad to earn small sum or to accommodate a
military officer.
 Double spies – the low informers and unreliable
renegades of value chiefly in spreading false
information to the enemy.
 Spies of consequences – couriers and
noblemen, staff officers, and kindred conspirators,
invariably requiring substantial bribe or bait.
 4) Intimidated Spies -persons who are forced
to undertake espionage against their will.

19
Hannibal
 He roamed around
the city often
disguising as beggar
to gather first hand
information.

20
Gaius Julius Caesar
 During his time, his
staff of each legion
includes ten
“speculators” who
served as
information-
collecting agency.

22
“speculators”
 were the first  They used carrier
intelligence pigeons that made
personnel to appear possible the amazing
definitely in a military speed with which
organization. intelligence of
 Information Imperial Rome was
collecting agency transmitted.
 Military success was
aided by
communication

23
Karl Schulmeister
 Napoleon’s military
secret service and
Napoleon’s eyes.
 Under a cover role,
he was able to
infiltrate the Austrian
General Staff and
studied the
characters of the
Generals.

24
Washington, George
 He, as grand master,  1st President of USA
mobilized the free
A man who is a
masons of the member of a
colonies at the large secret
society.
outbreak of the Freemasons
American war of promise to help
independence. each other, and
use a system of
secret signs in
order to
Organization where Rizal recognize each
and Luna are members. other.
Symbolizes solidarity
26
Richelieu
 He introduced the
network of covert
collectors who
transmitted prompt
and accurate
information to Paris
regarding the
activities of the
rebels and dissidents
of the kingdom.

27
Napoleon Bonaparte
“One spy in the  He maintained
right place is military intelligence
worth 20,000 men and secret political
service all over
in the field” Europe.
 Spy against spy was
of high proportion
during his time.

28
Bureau of Intelligence Topographic Bureau

 consolidated all  maintaineda large


incoming map which covers
information the latest
regarding the enemy information
for presentation to regarding both
the emperor and to enemy and friendly
obtain information forces.
as desired.
He organized two bureaus of
interest:
29
Alfred Redl

 He was homosexual agent.  a homosexual


 His treason led to the death Double Spy, who
of 500,000 agents and while working as
soldiers combine in his 13 intelligence director
years espionage episode. of Austria and
 He was convicted of treason Hungary, spied for
in 1913 he committed the Russians.
suicide
 Introduced the 3rd degree
method of interrogation
30
Brahma Kautilya
 He recommended to
his king that for the
ruler to succeed, the
ruler should strike at
his enemy’s weak
points by means of
spies.

32
Joseph Fouche
“Father of modern  Trained for the
political priesthood, he never
espionage” took orders,
 instead he became
 Created a network
teacher
of agent and his
assistance founded  Become the most
the modern system respected
of spying on spies, intelligence director
which later known as in french history.
counter espionage.
33
Gen. William Donovan
 Pres. Roosevelt
established the
Office of Strategic
Services (OSS) with
Donovan as in-
charged.
 “Father of
American
Intelligence”

34
Office of Strategic Services (OSS)
 The builder of a
central intelligence
system and
considered as
forerunner of the
CIA.

36
Edward I, King of England
 he organized the
profession “State
Informer”

37
Intelligence and the
World War

38
WORLD WAR I

39
Aircraft
 was
introduced as
a tool of
conducting
aerial
reconnaissance

40
“Agent Provocateur”
 was employed by the  Is a person who is
Russians for the employed by the
purpose of internal government or the
security and political police
repression.  To encourage certain
groups of people to
 Spying was always break the law
the specialty of the  So they can arrest
Russians. them or
 Make them lose
public support

41
German Intelligence
 gained a high  Offensive- is a
reputation for carefully planned
offensive attack made by a
effectiveness large group of
throughout Europe soldiers
but declined at the
outset of the war.

42
British Intelligence
 succeeded greatly by  Censorship- officially
means of censorship examine letters and
and its Code Room cut out any
combined with information that is
skillful use of covert regarded as secret.
agents.

43
US
 expanded their Naval
Intelligence wherein
Domestic
Counterintelligence
became a principal activity.

44
Dolphins

 The first
animal
used by
the
American
to spy.

45
US THREE (3) BRANCHES OF
INTELLIGENCE

46
1. Positive Branch
 Has the function of
collecting evaluating
and disseminating
intelligence.

 Prepare situation
estimate and
translate documents.

47
2. Negative Branch
 Counterintelligenc
e functions:
◦ investigate
disloyalty and
sedition,
investigate graft
and fraud in
organization.

48
3. Geographic Branch
 Produces maps,
photographs and
terrain studies

49
INTELLIGENCE DURING
WORLD WAR II

50
German Intelligence
 started the war with
the world’s best
organized intelligence
service through
advance preparation
of intelligence
accompanied by
troop movements.

51
Japanese Intelligence
 failed because it was
not provided with
sufficient number of
trained personnel to
assemble and evaluate
the mass of materials
which were collected
although Japanese
Intelligence was
involved in short war
and defensive in
nature.

52
British Intelligence
 Its achievement was  through penetration
the delay in the use and technical
of German V-Bomb. intelligence,
 The operation was
conducted with the  they discovered
OSS and Peenemϋndé, the V2
guided missile
research project of
Nazi Germany.

53
Notable Intelligence Organization
1. The Central Intelligence Agency (CIA) of
the United States of America.

A predecessor of the Office of Strategic Services


(OSS), which was formed in 1942 and

renamed CIA in 1947.

It is called “THE COMPANY”.


 2.TheBritish Secret Service [BSS
(MI5/MI6)] of the United Kingdom of
Great Britain.

 Established in
1909 as an internal
departments under the control of Secret
Service Bureau.

 MISnow is known as Secret Intelligence


Service (SIS)
56
3. Komitet Gosudarstvennoy
Bezopasnosti (KGB) of Russia.
 The
Committee for
State Security
 established in
1917 and
 known as KGB
in 1954.

58
 4. ha
Mossad le-Modin ule-Tafkidim
Meyuhadim (MOSSAD) of Israel.

 Literallymeans
 The Institute for Intelligence and Special
Tasks.
 It was formally established in 1951 and
 called “THE INSTITUTE”

60
Other Active Intelligence
Agencies
◦ RAW (India) – Research and Analysis Wing
◦ CSIS (Canada) – Canadian Security Intelligence
Service
◦ ASIS (Australia) – Australian Secret Intelligence
Service
◦ BND (Germany) - Bundesnachrichtendienst
◦ CNI ( Spain) – Centro Nacional de Inteligencia
◦ DGSE ( France) – Direction Generale de la Securite
Exterieure
◦ ISI ( Pakistan) – Inter – Service Intelligence
◦ MSS ( China) – Ministry of State Security
◦ GID (Jordan) – General Intelligence Department
◦ British Secret Service – Great Britain
◦ KCIA –Korean Central Intelligence Agency
◦ Britain: Scotland Yard, London,
Metropolitan Police Force
Note:
The counterpart of these
intelligence organizations in the
Philippines is the National
Intelligence Coordinating
Agency (NICA) which is under the
Office of the National Security
Adviser
NATURE OF INTELLIGENCE
FUNCTIONS

65
INTELLIGENCE
 is the end product resulting from the
collection, evaluation, analysis,
integration and interpretation of all
available information
 which may have immediate or potential
significance to the
 development and execution of plans,
policies and programs.

66
Are fundamental guides to action

PRINCIPLES OF INTELLIGENCE

67
The Principle of Objectivity
 It is thoroughly and carefully planned.
◦ In intelligence, only the well-guided
succeed.
◦ It is a basic intelligence concept that there
should be unity between knowledge and
action.
◦ Purposeful and reasonable.

68
The Principle of
Interdependence
◦ Intelligence is artificially subdivided into
component elements to insure complete
coverage, eliminate duplication and to
reduce the overall task or manageable size.
◦ It is manageable

69
Principle of Continuity
◦ It is necessary that coverage be
continuous so that the shape of what
happens today could be studied in the light
of what happened before, which in turn
would enable us to predict the shape of
things to come.

70
Principle of Communication
 Intelligence
adequate to their needs must
be communicated to all the decision-
makers in manner that they will
understand and from that will permit its
most effective use

71
Principle of Usefulness
◦ Intelligence is useless if it remains in
the minds, or in the files of its
collectors or its producers.
◦ The story must be told and it must
be told well.

72
Principle of Flexibility
 ability to adapt to new situation
◦ intelligence must have the ability to change
or be changed according to circumstances.
◦ Hence, alternatives must be drawn.

73
Principle of Selection
 Fits the needs of the commander because
of command responsibility
◦ In intelligence, it should be essential and
pertinent to the purpose at hand.

74
Principle of Timeliness
 Intelligence
must be communicated to the
decision maker at the appropriate time
to permit its most effective use.

75
Principle of Security
 Requires constant security measures
◦ Security is achieved by the measures
which intelligence takes to protect and
preserve the integrity of its activities.

Code of Omerta

76
CATEGORIES OF
INTELLIGENCE

77
NATIONAL Intelligence
◦ The total product of
intelligence developed
by all governmental
agencies
◦ that cover the broad
aspects of National
Security and
National Policy

NICA
78
DEPARTMENT Intelligence
 Intelligence used by the various
departments for the
advancement of each
departments/agencies.

79
Department of National Defense

◦ Intelligence Service of the Armed Forces of


the Philippines (ISAFP)
◦ Philippine Army - Intelligence Security Group
(PA-ISG)
◦ Philippine Navy - Naval Intelligence and
Security Force(PN-NISF)
 Department of Justice
◦ National Bureau of Investigation (NBI)

 Department of Interior and Local


Government
◦ Philippine National Police - Intelligence Group
(PNP-IG)
◦ Bureau of Jail Management and Penology -
Directorate for Intelligence (BJMP-Intelligence)
 Department of Finance
◦ Bureau of Customs - Intelligence Group (BOC-IG)
◦ Bureau of Internal Revenue - National Investigation Division
(BIR-NID)
 Department of Transportation and Communications
◦ Civil Aviation Authority of the Philippines - Security and
Intelligence Service (CAAP-SIS)
◦ Land Transportation Office - Intelligence and Investigation
Division (LTO-IID)
◦ Philippine Coast Guard - Intelligence, Security and Law
Enforcement (PCG-ISLE)
◦ Presidential Security Group - Presidential
Intelligence Company (PSG-PIC)
◦ Philippine Drug Enforcement Agency (PDEA)
◦ Metropolitan Manila Development Authority -
Security Intelligence and Investigation
Service(MMDA-SIIO)

83
MILITARY intelligence
◦ This is used in the
preparation of
military policies,
plans and
programs. It
includes strategic
and combat
intelligence.
 ISAFP

84
POLICE INTELLIGENCE
 It refers to evaluated
and interpreted
information
concerning organized
crime and other
major police
problems.
 Intelligence Group
(PNP)

 PDEA

85
TECHNICAL INTELIGENCE
 This concerns foreign
technical
developments, which
have a practical
military application and
the physical
characteristics,
performance,
capabilities, and
limitations of material Department of
and installation used trade and
by and for foreign.
commerce
A. MILITARY INTELLIGENCE
 It refers to evaluated
and interpreted
information
concerning an actual
or possible enemy or
the operations
including weather
and terrain, together
with the conclusions
drawn there from.

87
THREE (3) BROAD FIELDS OF
MILITARY INTELLIGENCE:

88
STRATEGIC INTELLIGENCE
 It is usually  It does not have
descriptive in nature, immediate
 accumulation of operational value
physical description
of personalities,  but rather long range
modus operandi, etc. that may become
relevant to future
police/military
operations.

89
a. Political Intelligence – deals
with Domestic and Foreign affairs
and relation of government
operations;
 Basic Principles of the
Government
 Government Structures
 Public Order and Safety
 Subversion
 Intelligence and Security
Organization
b. Economic Intelligence – deals with the extent and
utilization of Natural and Human resources to the
industrial potential of the Nations.
c.Transportation and Telecommunication
Intelligence - concerned with the operations
and facilities not only the Military but also the
Civilians.
d. Sociological Intelligence – deals with the
demographic and psychological aspects of groups of
people.
 Population and Manpower
 Characteristics of the People
 Public Opinion – attitudes of the majority of the
people towards
matters of public
policy.
 Education – based
on literacy rate
e. Biographical Intelligence – deals with
individual personalities who have actual
possession of power.
f. Geographical Intelligence – deals with the
natural as well as man made features of the
physical environment of man considered from the
point in view of military operations.
 Location – military and economic importance
 Size
 Shape
 Weather and Climate
g. Scientific Intelligence – deals with the
progress of the research and development as it
affects the economic and military potential of a
nation.
Line Intelligence (Tactical and Combat) – is
the intelligence required by the commander to
provide for planning and conduct of tactical
operation.This refers to knowledge of the People,
Weather, Enemy, and Terrain (PWET) used in
planning and conducting tactical and
administrative operation
in a counter insurgency.
A. People
 living condition of the people
 sources of income
 education of the people
 government livelihood of the people

 extent of enemy influence to the people


B. Weather
• visibility
 cloudy
 temperature
 precipitation (rain)
 Wind
C. Enemy
 location of the enemy
 strength of the enemy
 disposition
 tactical capability
 enemy vulnerability
D. Terrain
 relief and drainage system
 vegetation
 surface material
 man made features
3. Counterintelligence – it is the phase of
intelligence covering the activity devoted in
destroying the effectiveness of hostile foreign
activities and the protection of information
against espionage, subversion and sabotage.
1. SABOTAGE
 Thedeliberate destruction of
properties

103
Sabotage
 Derived from the French word “Sabot”, a wooden
shoe worn by lower classes. It is the symbol of
rebellious farmers/revolutionaries.

 Saboteur is the perpetrator of the act of sabotage.

 Sabotage is a form of subversive warfare.


 It maybe a direct action (factory arson) or indirect
action (hoax bomb scare)
Description of a Saboteur
 1. He is the most dangerous foe that
security will have to deal with while planning
and implementing security measures and
techniques.
 2. He is an ordinary looking as the next guy
but in his mind, he has the training in
deception, knowledgeable in incendiaries,
explosives, chemistry, bacteriology,
mechanics and psychology.
 3. He can work alone, in-groups, or
simultaneously in several places.

105
2. ESPIONAGE
 Act of spying.

 The act of secretly gathering information.

106
Description of an Espionage
Agent
 1. He is very dangerous adversary and his skills in
deception and his cunning should never be under
estimated.
 2. He is usually a person of extensive training and
will be highly effective in gaining the confidence of
people and of extracting information of value to
be relayed to his employer or handler.
 3. Even how well-trained an espionage agent he
might be, he is human like the saboteur and he
can be defeated in his own game if proper
methods and techniques are undertaken.

107
Some Methods Employed by
Espionage Agent
 1. Stealing of information from employees.
 2. Stealing information from records or other sources.
 3. Using various methods of reproducing documents,
products, equipment or working models.
 4. Using “front” as commercial concerns, travel agencies,
associations, business groups and other organizations to
obtain confidential information or data.
 5. Using various form or threats to obtain information.
 6. Using blackmail techniques by exposing intimate and
personal details concerning an individual or organization.
 7. Picking or securing information in social and other
gatherings.
 8. Penetration and operational tactics.

108
3. SUBVERSION
A systematic attempt to overthrow
or undermine a government or
political system by persons working
secretly from within.

109
Threats of Subversive Activity
 1. It can be local or national in nature and
their mission is to undermine the
authority, weaken the organization, and
eventually take over. This can be in
business or any activity.
 2. This can be in the form of rumor
mongering, propaganda, undermining
morale, and injecting defeatist attitudes,
and other emotional approaches.
 3. It is an activity not easy to detect.

110
POLICE INTELLIGENCE

111
POLICE INTELLIGENCE
 end product resulting from the collection,
evaluation, analysis, integration and
interpretation of all available information
regarding the
 activities of criminal and other law
violators for the
 purpose of affecting their arrest, obtaining
of evidence, and forestalling their plans to
commit crime.
112
Three Major Categories or
Types of Police Intelligence

113
STRATEGIC INTELLIGENCE
 primarily long-range
in nature with little
or no immediate
practical value.

114
COUNTER-INTELLIGENCE
 defending of the
organization against
its criminal enemies.
(Defensive Effort)

115
LINE INTELLIGENCE
 of an immediate
nature and necessary
for more effective
police planning and
operations.
(Offensive Effort)

116
Functional Classification of Police Intelligence
1. Criminal Intelligence (CRIMINT)- production
of intelligence essential to the prevention of
crime, and the investigation, arrest and
prosecution of criminal offenders.
2. Internal Security Intelligence (INSIT)-
knowledge essential to the maintenance of
peace and order.
3. Public Safety Intelligence (PUSINT)-
knowledge essential to ensuring the protection
of lives and properties.
CONCEPTS IN POLICE
INTELLIGENCE

118
Information
 Raw data or  imagination,
unevaluated material  and other sources
of every description
derived from
 from which
 observation, intelligence is
 communication, produced.
 reports,
 rumors,

119
Source
 where the
information is
obtained.

120
Open-source intelligence (OSINT) is a form of
intelligence collection management that involves
finding, selecting, and acquiring information from
publicly available sources and analyzing it to produce
actionable intelligence. Examples are:
 Media: newspapers, magazines, radio,
television,
 Web-based communities
 Public data: government reports, official data such as
budgets, demographics, hearings, legislative debates,
press conferences, speeches,
 Observation and reporting
 Professional and academic: conferences, symposia,
professional associations, academic papers,
Close Sources (Covert/Close Source)
Surveillance
Casing
Elicitation
Surreptitious Entry

Employment of Technical Means such as:


Bugging and Tapping Devices
 Open Sources  Close Sources
 They can be located
 The information may be
obtained from news files, inside a building, safe
libraries, magazines, or vaults.
books, or non-classified  1% of all information
files in certain public or
is from close
private offices.
sources.
 99% of the information
collected is coming from
open sources
GENERAL CLASSIFICATION OF
SOURCES OF INFORMATION
123
Human Intelligence (HUMINT) as "a category
of intelligence derived from information collected
and provided by human sources."[1] Typical
HUMINT activities consist of interrogations and
conversations with the persons having access to
pertinent information.
Imagery Intelligence (IMINT), is an intelligence
gathering discipline which collects information via
satellite and aerial photography
126
127
Signals intelligence (SIGINT) is intelligence-
gathering by interception of signals, whether
between people ("communications
intelligence"—COMINT), whether involving
electronic signals not directly used in
communication ("electronic intelligence"—
ELINT), or combinations of the two.
Communications Intelligence (COMINT) is a
sub-category of signals intelligence that engages in
dealing with messages or voice information
derived from the interception of foreign
communications.
• Voice interception
• Text interception
• Monitoring friendly
communications
• Signaling channel
interception
POLICE INTELLIGENCE AND MILITARY
INTELLIGENCE
• Police Intelligence(Urban Intelligence)
- It is defined as an evaluated and interpreted
information concerning organize crime and
other criminal activities.
• Military Intelligence(Combat Intelligence)
- it is an evaluated and interpreted information
concerning an actual or possible, enemy or
theatre of operations, including whether and
terrain, together with the conclusions drawn
therefrom.
INTELLIGENCE CYCLE
 It
is a repetitive process used
to produce intelligence from
information.

131
Mission
 the focal point of the
intelligence operation;
 a particular task given
to a person or group
to carry out;
 or one which should
be accomplished.

132
INTELLIGENCE CYCLE
information is
Recording, Evaluation, disseminated to
Integration and the agency, unit or
Interpretation command to effect
DIRECTING or implement the
mission.

COLLECTING
DISSEMINATION MISSION
thecollecting agency
& USE
determines what
specific informationPROCESSING
is Selection of
to be collected, by collecting agency
whom and from
whom.
133
Phase 1 - Directing Collection
Effort
Directing
 the Intel Staff Officer or Unit commander
 determines the required or important
information relevant to mission.
 Then these requirements will be
distributed to the
 different collection agencies
 by direction or by request.
Planning the Collection Effort
FIVE (5) Steps:
 Determine intelligence requirements

 Determine intelligence priorities

 Determine enemy activities, characteristics of the

area of operations
 Issuance of Orders and requests and the selection of

collection agencies to be employed


 Supervise the execution of order and requests
Phase 2 - Collecting The
Information
Collecting
 the collecting agency  After the collecting
 determines what activity is carried out,
 specific information
the collected
is to be collected, information is
 then submitted for
 by whom and from
whom. processing.
Who is tasked to collect
information?
1. Intelligence officers/agents-
regular members
2. Civilian Agents-informers and
informants
3. Assets- establishment of institution
which assists in providing
information.
overt covert
 open  secret

What are the methods of


collection?
Collection Planning
 the continuous
process which
ultimately coordinate
and integrate the
efforts of all
collecting
Agencies/Units.
What to consider in collection
planning?

ERIC SAWATI CATTE


used in committing
the crime i.e., group committing
PERSONALIT
modus
firearms, Y
transportation
operandi/crime the crime
facilities, etc.
activities, time of
attack, victims,
place of attack,
ORGANIZATION
RESOURCES
etc. persons/EQUIPMENT
involved:
suspects,
social
ACTIVITY
status,
etc.
ERIC SAWATI CATTE
Phase 3 - Processing The Collected
Information
The collected information is
transformed into intelligence.

144
THREE STAGES
PROCESSING:

1. Recording
2. Evaluation
3. Interpretation

145
1. Recording
 it is the reduction of  and the arranging of
information into this information into
writing or some groups of related
other form of items.
geographical
representation

146
Means of Recording Information
◦ Intelligence Journal
 Contains chronological log of significant intelligence
activities
 It includes all outgoing and incoming messages and
significant incidents concerning the operations of
intelligence agencies covering a specified period.

 Note: Intelligence journal contains synopsis of messages and


details about the identity of sender, time of received, method
of transmission, action taken and other similar information.
INTELIGENCE JOURNAL
◦ Intelligence Workbook

 Provides a means of systematic arrangement of


information by type or subject to serve as a
ready reference
 It aids in sorting, evaluation and interpretation of
information in the preparation of intelligence
reports
INTELLIGENCE WORKBOOK
◦ Situation Map

 A graphic representation of the current enemy


situation.
 The situation is posted on the map with
appropriately colored signs and symbols
 Examples of Entries in Situation Map
 Unit identification
 Unit disposition
 Boundaries
 Location of weapons
 Obstacles and defensive installations
 Terrain data
 Roads and trails for movement of personnel
◦ Intelligence Files

 1. Journal File - Contains record copy of each


message or document noted in the journal. It
supports the journal and serves also as permanent
and official record
 2. Information or Reference File – All information of
possible future value is cross indexed in this file.
Much information is collected which has no
immediate interest but which maybe of future
value.
 3. Order of Battle and Wanted List Files

 Order of Battle is the identification,


strength, command structure, and
disposition of personnel, units, and
equipment of subversive elements.While
the wanted list files is the consolidated
list of persons with warrant of arrest.

156
◦ Identification Files

 Refers to files in the intelligence unit of


personalities of crime which contains;

 Locations of illegal or suspected illegal activities


 Vehicle registry used by hoodlums
 Telephone number of suspects
 Types of Identification Files

 Person
 Numbers
 Non – person
2. Evaluation
 The determination of  reliability of the
the pertinence of the source of or agency
information to the the accuracy of the
operation information; or
examination of raw
information to
determine
intelligence value.

159
Purposes of evaluation:
 Pertinence (usefulness) – does it hold some
value to current operation? Is it needed
immediately?
 Reliability (dependable) – judging the source
of information
 Credibility (truth of information) – Is it
possible for the reported fact or event to have
taken place?
 Is the report consistent within itself?
 Is the report confirmed or corroborated by
information from different sources or agencies?

160
3. Interpretation
 it is establishing the
meaning and
significance of the
information.
 It involves the
following:
1. Analysis
2. Integration
3. Deduction

161
Analysis
◦ The determination of  and drawing
significance of deductions about
information relative probable meaning of
to the information the evaluated
and information.
◦ intelligence already
known

162
Integration
◦ it is the ◦ intelligence to form a
combination of the logical feature
elements stated in ◦ or hypothesis for
assessment with enemy activities
other known ◦ or information of the
operational area and
information
characteristics of the
mission of the
command.

163
Deduction
◦ The formulation
of conclusions
from the theory
developed, tested
and considered
valid;
◦ determination of
effort and meaning
of the information.

164
EVALUATION GUIDES:

165
RELIABILITY OF INFORMATION

A Completely reliable

B Usually reliable

C Fairly reliable

D Not usually reliable

E Unreliable

F Reliability cannot be judged

166
ACCURACY OF INFORMATION
1 Confirmed by other sources

2 Probably true

3 Possibly true

4 Doubtfully true

5 Improbable

6 Truth cannot be judged


167
SOURCES OF INFORMATION
T Direct observation by the commander and chief of a
unit
U Reports by penetration agent or resident agent

V Report by PNP/AFP troops involved in encounter

W Interrogation of capture enemy agent/foreigner

X Observation of government and civilian employee or


official
Y Observation by a member of the populace

Z Documentary
168
Phase 4 - Dissemination And Use

169
Dissemination And Use
 Final phase of the  to effect or
cycle. implement the
 Processed mission.
information is
disseminated to the
agency, unit or
command

170
SUMMARY
 PLANNING ( Most Crucial)
1. Determine Intel Requirements
2. Determine Intel Priorities
3. Determine Indicators
4. Determine Orders and Request
5. Select Collection Agencies
6. Supervise
SUMMARY

 COLLECTION OF INFORMATION (
Most Dangerous)
1. Sources of Information
2. Agencies
SUMMARY
 PROCESSING OF INFORMATION
( Most Tedious)
1. Recording
- Journal
- Workbook
- Intel Map
2. Evaluation
- Pertinence
- Reliability
- Accuracy
3. Integration
- Analysis
- Integration
- Deduction
SUMMARY

 DISSEMINATION OF INFORMATION
( Most Critical)
1. Timely
2. Proper
OVERT METHOD
AND
COVERT METHOD

175
OVERT OR OPEN METHOD
 The information of  Aka “Overt
documents is Intelligence”
produced openly
without regards as to
whether the subject
of the investigation
becomes
knowledgeable of the
purpose for which it
is being gathered.

176
COVERT OR CLOSED
METHOD
 The information is  Aka “Covert
obtained without Intelligence”
knowledge of the
person against
 whom the
information or
documents may be
used.

177
CASING
 literally means  used in intelligence
putting a thing, or operation – the
place in a case. continuous
monitoring of a place
or area at a given
period of time.

178
CASING
The reconnaissance or surveillance of a
building, place or area to determine its
suitability or vulnerability for intelligence
operation.
Purpose/ Objectives of Casing:

◦ Suitability- selection of sites for personal


meetings, dead drops, clandestine radio
communications, reception for air, sea drops, safe
house, etc.
◦ Planning for Operation Use- to gather
information for target analysis for audio/ video
surveillance, clandestine photography, preparation
for search, etc.
◦ Verification/ validation- to verify the bona fide
of an officer or business establishments, the
nature of an address, the use of an office for a
purpose other than what it purports to be.

180
Types of Casing
 External- the close observation and
clear description of an area, building or
installation, particularly its location,
approaches and exits, types of physical
barriers used, its immediate vicinity, etc.
 Internal- the close observation and clear
description of the layout of a building, an
office or a room, etc.

181
METHODS OF CASING

182
Personal reconnaissance
 the most effective
method and will
produce the most
essential information
since you know just
what you are looking Observing
for.
only in a short
span of time.
Not too long.
183
Map Reconnaissance
 Terrain and
geographical
locations.

184
Research
 much information  PGI
can be obtained or
acquired through
research.

185
Prior Information
 your unit and the
other units may have
file report that they
may provide you with
relevant information.

186
Hearsay
 information usually
gain by the person
operating in the area
and performing
casing job.

187
SURVEILLANCE
The disguise or secret observation of a
place, person and vehicle for the purpose of
obtaining information concerning the identities
or activities of the subject.
SURVEILLANT – the person who maintains
the surveillance or performs the observation.
Kinds of Surveillance
1. Surveillance of place
2. Tailing or shadowing
3. Undercover investigation or roping
1. Surveillance of a place
Two types
a. Using a room in a nearby house or business
establishment and remain undercover
b. Remaining outdoors and posing as a person who
would normally conduct his business in such area
2. Shadowing or Tailing - The act of following a person
Shadowing or Tailing
 Itis the act of following a person with the
following purposes:
◦ To detect evidence of criminal activities;
◦ To establish the associations of a suspect;
◦ To find a wanted person;
◦ To protect a witness or other persons;
This is the most effective
◦ To discover the associations, amusements and
habitssurveillance
of an employee whomethod
is considered for a
sensitive position; and
◦ To check loyalties of employees.

191
Methods of Shadowing/Tailing by
Foot

192
1. One Man shadow
 commonly used
because of the
least number of
men involved.
 It is the most
difficult but you
can decide on
your own.

193
2. Two Man Shadow
 This is more  One officer will
advantageous follow the subject
because it permits and the other will
immediate change keep abreast or on
and are less likely to the opposite side of
be recognized. the street.

194
3. Three Man Shadow or ABC
Method
A is closest to subject S. He follows S at a
distance depending on the pedestrian
traffic.
 B follows A about the same distance
between A and S.
 B and C take turns in occupying the A
position.
 Pre-arranged signals should be employed.

195
4. Group Method
 When several men are assigned to a
“group” tail, each man maintains contact
with the subject.

196
C. UNDERCOVER ASSIGNMENT OR
ROPING
 Undercover Assignment- A form of
investigation in which the investigator assumes
different and unofficial identity in order to obtain
information.
 Cover story – It is a biographical account, true
or fictitious, or a combination of truth or fiction
which portrays the undercover agent’s past
history, and current situation.
TYPES OF SURVEILLANCE
According to Intensity and Sensitivity
a. Discreet – subject is unaware that he/she is
under observation
b. Close – subject is aware that he/she is under
observation. Used to protect the subject or
stop him to commit crime.
c. Loose – applied frequently or infrequently.
Period of observation may vary on each
occasion
Other Forms of Surveillance:
a.Normal- distance between surveillant is
about half a block part.
b.Very Discreet- distance is just enough to
maintain visual contact with subject.
c.Strip- several teams alternating take over the
surveillance after some distance to lull target
into a false sense of security.

199
Types of Surveillance
according to Methods

200
Stationary
 observation of place
usually a bookie stall,
gambling joint, or a
residence where
illegal activities are
committed (fixed
point position).

201
Moving
 surveillants follow
the subject from
place to place to
maintain continuous
watch/observation of
his/her activities.

202
Technical
 uses communication
and electronic
hardwares, gadgets,
systems and
equipment.

203
Special Methods of surveillance
Wire Tapping – the telephone lines is tapped
somewhere along the line, either the street
line or telephone company. The tapped lines
is run into
a recorder
which is
monitored
by the
investigator.
Concealed Microphones (bugging) – The
microphone may be concealed in the room or
maybe disguised as common object such as desk
ornament.
Eavesdropping – secretly listening to
conversations
207
1. Tape recorder – a pocket sized tape
recorder maybe concealed when recording
the conversation.
2. Television – closed circuit system maybe
used so that the activities of the subject
maybe observed by the surveillant at a
distance
Elicitation
 An indirect form of interrogation
which is characterized by the
obtaining of information through
subterfuge/ trickery.
 Its ultimate object is to get the
subject talking about topics of
interest to him.
209
Stake out
 The observation of
places or areas from
a fixed point.

210
Plant
 Similar
with
stakeout and
undercover.

211
Fixed Surveillance
 Similar
with
stakeout.

212
Undercover Man
 A person trained to  the later reports the
observe and observation and
penetrate certain information so that
organization proper operational
suspected of illegal action can be made.
activities and

213
PRE-SURVEILLANCE
CONFERENCE
A conference held among the team
members, police intelligence unit before a
surveillance in conducted.

214
Liaison Program
 This is the assignment
of trained intelligence
personnel to other
agencies in order to
obtain information of
police intelligence
value.
 (Agencies like the
press, credit agencies,
labor unions,
telephone companies,
etc.)

215
Safe House
 It is a place, building,
enclosed mobile, or
an apartment, where
police undercover
men meet his action
agent for debriefing
or reporting
purposes.

216
Drop
 It is a convenient,  DEAD LETTER
secure, and DROP – a place
unsuspecting place where a person can
where a police, hide information so
undercover man, that it can later be
informer, or informant picked up by another,
by a pre-arrangement without seeing each
leaves a note, a small other
package, an envelope
to item for the action
agent, supervisor or
another agent.

217
Contact
 Any person or
subject picks or deals
with while he is
under surveillance.

218
Convoy
 A countermeasure to
detect a surveillance;
 Usually a person, is
employed to
determine whether
or not a subject is
under surveillance.

219
Made
 AKA “burnout”
 When subject under
surveillance becomes
aware that he is
under observation
and identifies the
observer

220
Burn the Surveillance
 When a surveillant’s
behavior cause the
subject to surmise or
know that he or she
is under surveillance.

221
Lost
 When the
surveillants do not
know the
whereabouts of their
subject or the
subject had eluded
the surveillants.

222
Subject

 The party under surveillance.

223
Rabbit (Hare)
 Term referring to the
subject of shadowing
and tailing.

224
DEBRIEFING
 – detailed  who is aware of the
questioning of an questioner’s interest
agent, or of a person in intelligence
who has been matters, for the
involved in a purpose of acquiring
situation of as accurate and
intelligence complete coverage
operational interest as possible of all
and matters of
operational or
intelligence concern

225
Surveillant
 Theperson
conducting the
surveillance.

226
Tail
 Tofollow and
keep under
surveillance; a
surveillance.

227
Test for Tailing
 The common trick of  The rabbit usually
the subject (rabbit) boards a public
when he becomes conveyance then
conscious that he is jumping off the
being tailed. vehicle then he looks
about quickly to
determine if any
another person
jumps off also.

228
Tailgaiting
 A form of open
surveillance in which
the subject’s vehicle
is closely followed.

229
Shadow
 Tofollow secretly;
to place a person
under surveillance.

230
Tailing or Shadowing
 It is the observation
of a person’s
movement.
 Following the
person.

231
Technical Surveillance.
 Surveillance involving
the use of scientific
device to enhance
hearing or seeing the
subject’s activities.

232
Moving Surveillance
 The surveillant
moved about in
order to follow
the subject.

233
Open Surveillance
 A surveillance with
little or no attempt
at concealment; also
termed rough
surveillance. The
subject is most likely
aware of the
surveillance, but must
not be lost.

234
Mustard Plaster
 A form of open
surveillance;
 here, the subject is
followed so closely
that surveillant and
subject are almost in
lock step.
 It is tantamount to
protective custody.

235
Pen Register
 A device that
records all numbers
dialed on a telephone
company’s central
office.

236
Beeper
 A battery operated
device that emits
radio signals which
permit it to be
tracked by a
directional finder-
receiver. Also called
beacon, transponder,
and electronic
tracking device.

237
D. OBSERVATION AND
DESCRIPTIONS
ODEX

238
OBSERVATION
 The complete and
accurate awareness
by an individual of his
surroundings and
encompasses the use
of all major senses to
register and
recognize its
operational or
intelligence
significance.

239
Psychologists estimate that
approximately:
 85% of your knowledge is gathered
through sight.
 13% of your hearing.
 2% through the three senses

240
PSYCHOLOGICAL
ELEMENT OF OBSERVATION
 attention
◦ being brought into the presence of a fact
 perception
◦ ability to understand a fact to which attention
has been drawn to
 report
◦ the natural tendency of an individual to
inform someone when attention and
perception occur

241
DESCRIPTION
 The factual reporting
of what is observed.
Or, it is the actual
and factual reporting
of one’s observation
or the reported
sensory experience
recounted by
another.

242
CATEGORIES OF
DESCRIPTION
 personality description
◦ the personal inventory of an individual
derived from his physical characteristics,
biographical data, habits and mannerism etc.
 activity description
◦ description of incidents, activities or events
 installation and area description
◦ casing

243
PARTS OF PERSONALITY
DESCRIPTION
 general characteristics
◦ specific information about an individual (name,
age, date of birth etc)

 specific characteristics
◦ information on characteristics unique to the
individual (appearance, deformities)

244
USES OF PERSONALITY
DESCRIPTION
 recognition
◦ subjects of intelligence interests, suspects in
criminal activities
 identification files
◦ input in a card reference for more positive
identification
 identification of suspected surveillants

245
Cover and Undercover
Operation

246
Undercover Operation
 an intelligence/ investigation technique
in which the investigator conceals his true
identity and
 adopts an assumed role to accomplish an
intelligence/ investigation mission.

247
Types of Undercover Assignment
 Dwelling Assignment-to reside in or near
the dwelling of target to maintain constant
contact with the home life of the subject.
 Work Assignment- getting employed
where the investigator can observe the
activities of the subject at his place of work.
 Social Assignment- frequent places of
entertainment and amusement habitually
being visited by the target.

248
 Personal Contact Assignment- the
investigator is required to develop the
friendship and trust of the target.
 Multiple Assignment – the investigator
is tasked to cover two or more of the
above specific assignments simultaneously;
it can produce extensive information with
minimum expenses but more prone to
compromise.

249
INFORMERS AND
INFORMANTS
Informers – Persons who give
information in return for a prize,
reward or promise.
TYPES OF INFORMERS
1. Ordinary Informers – one who openly gives
information but expect anything in return, either
money or favor.
2. Confidential Informers – one who
confidentially provides information with
understanding that his identity will not be
revealed and that he will compensate with money
or favor
Informants – Any person who gives information
without expectation of anything in return.
TYPES OF INFORMANTS
1. Voluntary informants – those who knowingly and
voluntarily provides information.
2. Involuntary informants – those who give
information even though they don’t desire of doing
so
3. Confidential informants – those who provide
information with the understanding that their
identities will not be revealed
4. Special informants –one who gives information
concerning specialized cases only and is regarded
special treatment by the operatives.
5. Anonymous – those who provide information but
refuse to divulge his identity.
OTHER TYPES OF INFORMANTS
1. Rival-elimination informants – is usually
anonymous. His purpose of supplying information
is to eliminate rival or competition.
2. False Informants – reveals information usually of
no consequences or stuff concocted of thin air.
3. Frightened informants – may be prodded with
fear or self-interest.
He may run to the
police when he sees
that his confederates
are about to be
involved in a
dangerous situation.
1. Mercenary informants – has something to sell.
He may be a valuable one. Sometimes there may
be revenge motive present.
2. Double crosser informant – uses his seeming
desire to give information as an excuse to talk to
the police in order to get more information than
he gives.
3. Legitimate informants – will include operators
of license premises who do not want their places
to be infected with criminal activities.
4. Woman informant – may be the female
associate of the criminal. She may be able to give
information, but beware with this kind of
informant because women are more deadly than
males.
 Accidental Informants- a person who
casually imparts information to an officer
with no intention of providing subsequent
information
 Self- aggrandizing informant- Hangs
about the fringes of the underworld and
delights in surprising the police with choice
bit of information. From time to time, his
information may be of value.

FOUR PHASES OF INFORMANT
RECRUITMENT
1. Selection – It is particularly
desirable to be able to identify and
recruit an informant who has access
to many criminal groups or subversive
organizations.
 Wide access is probably the single
most importance feature in the
consideration of recruiting the
potential informant.
2.Investigation – The investigation of the potential
informants that has tentatively identified as
probable must establish possible existing motives
as to why this person might assist the police
intelligence community.
3.Approach –
Explanation of
contract.
4.Testing
GENERAL TREATMENT OF INFORMANT
1. Avoid the use of derogatory terms in
referring to informants in any type.
2. Avoid disclosing the identity of informant
which will in most cases ruin his potential.
3. Protect the interest of the informants,
remember an investigator is usually just as
good as his source of information.
4. Consider all information from known or
unknown informants as valuable until proven
otherwise.
5. Be non-committal on the value of the
information received.
6. Express appreciation to all information
received regardless of its value.
7. Keep appointment on time even though
informant may not.
8. Don't get over anxious, be patient, take your
time.
9. Keep control on the investigation.
10. Keep what you know to your self, don't
become an informant's informant.
CLANDESTINE
OPERATION
ELEMENTS OF CLANDESTINE OPERATION
* Informant Net – A controlled group of persons
who worked through the direction of the agent
handler.
A. Sponsor – directs the organization conducting
the clandestine activity
B. Target – refers to person, places or things
against which the clandestine activity is to be
used.
C. Agent – person who conducts the clandestine
operation to include the following:
1. Principal Agent – leader or management agent in
clandestine operation usually undertaken by the case
officer.
2. The Action Agent – refers to the doer of the
clandestine operation to include the following:
Espionage agent – agent who clandestinely
procure/collect information
Propagandist – agent who molds the attitude,
opinions, and actions of an individual, group or nation.
Saboteur – agent who undertakes positive action
against an unfriendly power, resulting in the loss of use
temporarily or permanently of an article, material,
facility, process or other physical resources.
 Guerilla – agent who is a member of a
Para-military group organized to harass the
enemy in a hot war situation
 Strong arm – agent who is made to
provide special protection during dangerous
phase of clandestine operation
 Provocateur – agent who induces an
opponent to act to his own detriment by
discrediting himself or by revealing his true
purpose or identity.
 Provo caper- otherwise known as
diversionist, a person who is engaged in
disruptive actions
3. Support agent – agent who is engaged in activities, which
supports the clandestine operation and or the action agent
in his operation.
Surveillant – agent who observes personnel and places fro
intelligence interest.
Investigator – agent who undertakes to procure information or
things of clandestine operation of interest.
Procurer of funds – agent who obtains special currency when
needed for operational use.
Procurer of supplies – agent who obtain supplies and he is
known as the purchasing agent, procure ordinary as well as
critical operational supplies.
Safe house keeper – agent who manages and maintains a safe
house for clandestine operational; use as meetings, safe
haven, briefing and debriefing.
Manager of Storage Area – agent who manages and arranges
storage area for distribution or transportation of operational
supplies.
Communication Agent – agent who is detailed as security of
clandestine communication
4. Other agents
 1) Double Agents
 Individuals who are simultaneously employed
by two opposing intelligence agencies with one
of the agencies are aware of his dual role.
 2) Dual Agents
 Individuals who are simultaneously and
independently employed by two or more
friendly intelligence units, and who do not
show preference for either, and normally
motivated by material gain.
265
FACTORS TO CONSIDER IN THE SELECTION
OF ACTION AGENT
1. Placement – Location of the prospective agent
with respect to the target.
2. Access – The capability or ability of the
prospective agent to obtain the desired
information for the intelligence organization or
to perform the intelligence collection mission in
the area.
a. Primary access – It has the direct access to
the desired information.
Infiltration – the insertion of action agent inside the target
organization.
Penetration – recruitment of action agent inside the target
agent.
b. Secondary access – The access to the desired
information through principal source where the
latter has the direct access.
c. Outside access – The agent is employed
outside the target and merely monitors
information from a third person who is
monitoring information in the area
4. Control – Authority to direct agent to carry out
task or the requirement in behalf of the clandestine
organization in acceptable manner.
a. Positive Control – Characterized by
professionalism and rapport.
b. Negative Control – Blackmail and threat
1. Disciplinary Action – Verbal Reprimand
2. Escrow Account – putting his salary in a bank
and to be withdrawn
only after fulfillment
of the mission.
3. Blackmail
CRYPTOGRAPHY
cryptology; from Greek
kryptos, "hidden, secret"; and ,
gráphin, "writing", or -logia, ,
"study", respectively) is the
practice and study of hiding
information.

269
CRYPTOGRAPHY
 Science/ study of
encoding information
in the form of codes
and ciphers.
 The act in writing in
cipher or secret
character or the
particular used.

270
Secret Codes Commonly Used by
Intelligence Officer
 One-Time Pads (OTP). A One-Time Pads or
OTP is used for secret communications by just all of
the world’s major intelligence agencies.
 Invisible Writing. Writing invisible messages is also
a good way of passing information between
people; a message can be written on a blank note
and passed quite naturally to another person.
 Code Word. The handler can make a list of code
words that can be passed on to the agents.
 Morse Code. Is just a simple substitution code
based on dashes and dots

271
Cryptography
CODES
AND
CIPHERS
Codes Ciphers

 Usessymbols or  Uses individual


groups of letters to letters to represent
represents words or words or phrases
phrases.

275
CIPHERS
Encoding
 To convert a message to a code.

277
Decoding
 Totranslate a message into ordinary
language from code.

278
Translation
 The transformation/conversion of one
language to another.

279
Cryptographer
A person who is highly skilled in
converting messages from clear to
unintelligible forms by the use of
codes and ciphers.
 Also known as Coder, Encrypter,
or Code Clerk.

280
Crypto Analyst
 Those who break intercepted codes.

281
PERSONNEL
SECURITY

282
 Most important because security
involves people, both as assets to
be protected and as source of
security threats.

 It
emphasizes the need to set up a
system of hiring the people for
the company.

283
If you plan to work,
work your plan.

If you fail to plan,


you plan to fail.

284
Thank you
And
Good Day !!!

You might also like